Package: debian-handbook
Version: 6.0+20120509
Severity: minor
Tags: patch

The attached patch changes the spelling of many words to US English. I
wouldn't normally bother, but the language is specifically listed as
"en-US" so it seems appropriate. I'm submitting this separately from
the other spelling patches so you can easily reject these if you like.


-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- no debconf information
--- a/en-US/04_installation.xml
+++ b/en-US/04_installation.xml
@@ -535,7 +535,7 @@
       timestamps on logs will be correct from the first boot. For them to
       remain consistently precise over time, an NTP daemon needs to be set
       up after initial installation (see <xref
-      linkend="section.synchronisation-horaire"/>).</para>
+      linkend="section.synchronization-horaire"/>).</para>
     </section>
     <section>
       <title>Administrator Password</title>
--- a/en-US/08_basic-configuration.xml
+++ b/en-US/08_basic-configuration.xml
@@ -395,7 +395,7 @@ $ </computeroutput><userinput>ls travail/</userinput>
 
       <para>A router is a machine that connects several networks to each
       other. All traffic coming through a router is guided to the correct
-      network. To do this, the router analyses incoming packets and
+      network. To do this, the router analyzes incoming packets and
       redirects them according to the IP address of their destination. The
       router is often known as a gateway; in this configuration, it works
       as a machine that helps reach out beyond a local network (towards an
@@ -1961,7 +1961,7 @@ macosx=/dev/sda5
 	autumn).</para>
       </sidebar>
     </section>
-    <section id="section.synchronisation-horaire">
+    <section id="section.synchronization-horaire">
       <title>Time Synchronization</title>
       <indexterm><primary>time synchronization</primary></indexterm>
       <indexterm><primary>clock</primary><secondary>synchronization</secondary></indexterm>
--- a/en-US/10_network-infrastructure.xml
+++ b/en-US/10_network-infrastructure.xml
@@ -1245,7 +1245,7 @@ if_prefix=eth0
       dedicated to software specially rebuilt for IPv6; this archive was
       decommissioned in March 2007, both for lack of time and for lack of
       interest (since most of the patches have been integrated into the
-      official packages). If your favourite package does not work with IPv6
+      official packages). If your favorite package does not work with IPv6
       yet, help can be found on the <emphasis>debian-ipv6</emphasis>
       mailing-list. <ulink type="block"
       url="http://lists.debian.org/debian-ipv6/"/></para>
--- a/en-US/11_network-services.xml
+++ b/en-US/11_network-services.xml
@@ -430,7 +430,7 @@ smtpd_client_restrictions = permit_mynetworks,
 	last. Each rule can accept the message, reject it, or leave the
 	decision to a following rule. As a consequence, order matters, and
 	simply switching two rules can lead to a widely different
-	behaviour.</para>
+	behavour.</para>
 
 	<para>The <literal>permit_mynetworks</literal> directive, used as
 	the first rule, accepts all emails coming from a machine in the
@@ -988,7 +988,7 @@ SOCKET=inet:10002@127.0.0.1
       some important parameters can still be customized with
       <command>dpkg-reconfigure clamav-base</command>. Similarly, running
       <command>dpkg-reconfigure clamav-milter</command> allows defining the
-      mail filter's behaviour in some detail.</para>
+      mail filter's behavour in some detail.</para>
 
       <para>The last step involves telling Postfix to use the
       recently-configured filter. This is a simple matter of adding the
@@ -1007,7 +1007,7 @@ smtpd_milters = inet:[127.0.0.1]:10002
       <sidebar>
         <title><emphasis>IN PRACTICE</emphasis> Testing the antivirus</title>
 
-	<para>Once the antivirus is set up, its correct behaviour should be
+	<para>Once the antivirus is set up, its correct behavour should be
 	tested. The simplest way to do that is to send a test email with an
 	attachment containing the <filename>eicar.com</filename> (or
 	<filename>eicar.com.zip</filename>) file, which can be downloaded
@@ -1197,7 +1197,7 @@ relay_host = [mail.falcot.com]
 
 	<para>Another possibility is to use a dedicated MPM, such as the
 	one provided by <emphasis role="pkg">apache2-mpm-itk</emphasis>.
-	This particular one has a slightly different behaviour: it allows
+	This particular one has a slightly different behavour: it allows
 	“isolating” virtual hosts so that they each run as a different
 	user. A vulnerability in one website therefore cannot compromise
 	files belonging to the owner of another website.</para>
@@ -1259,7 +1259,7 @@ relay_host = [mail.falcot.com]
       (which only works in version 1.1 of the HTTP protocol — fortunately
       that version is old enough that all clients use it already).</para>
 
-      <para>The (increasing) scarcity of IPv4 addresses usually favours the
+      <para>The (increasing) scarcity of IPv4 addresses usually favors the
       second method; however, it is made more complex if the virtual hosts
       need to provide HTTPS too, since the SSL protocol hasn't always
       provided for name-based virtual hosting; the SNI extension
@@ -1963,7 +1963,7 @@ options lockd nlm_udpport=2045 nlm_tcpport=2045
       <para>In order to not give root access to the filesystem to any NFS
       client, all queries appearing to come from a root user are considered
       by the server as coming from the <literal>anonymous</literal> user.
-      This behaviour corresponds to the <literal>root_squash</literal>
+      This behavour corresponds to the <literal>root_squash</literal>
       option, and is enabled by default. The
       <literal>no_root_squash</literal> option, which disables this
       behavior, is risky and should only be used in controlled
--- a/en-US/12_advanced-administration.xml
+++ b/en-US/12_advanced-administration.xml
@@ -98,7 +98,7 @@
 	increase in data safety without requiring investing in expensive
 	high-end disks. Probably due to image concerns, however, it's now
 	more customarily considered to stand for
-	<emphasis>independent</emphasis>, which doesn't have the unsavoury
+	<emphasis>independent</emphasis>, which doesn't have the unsavory
 	flavour of cheapness.</para>
       </sidebar>
 
@@ -498,7 +498,7 @@ Working Devices : 2
 	state of a RAID mirror is that both disks have exactly the same
 	contents. However, nothing guarantees this is the case when the
 	volume is first created. The RAID subsystem will therefore provide
-	that guarantee itself, and there will be a synchronisation phase as
+	that guarantee itself, and there will be a synchronization phase as
 	soon as the RAID device is created. After some time (the exact
 	amount will depend on the actual size of the disks…), the RAID
 	array switches to the “active” state. Note that during this
@@ -506,7 +506,7 @@ Working Devices : 2
 	redundancy isn't assured. A disk failing during that risk window
 	could lead to losing all the data. Large amounts of critical data,
 	however, are rarely stored on a freshly created RAID array before
-	its initial synchronisation. Note that even in degraded mode, the
+	its initial synchronization. Note that even in degraded mode, the
 	<filename>/dev/md1</filename> is usable, and a filesystem can be
 	created on it, as well as some data copied on it.</para>
 
@@ -521,12 +521,12 @@ Working Devices : 2
 	  <filename>missing</filename> instead of a device file as one of
 	  the arguments to <command>mdadm</command>. Once the data have
 	  been copied to the “mirror”, the old disk can be added to the
-	  array. A synchronisation will then take place, giving us the
+	  array. A synchronization will then take place, giving us the
 	  redundancy that was wanted in the first place.</para>
         </sidebar>
 
         <sidebar>
-          <title><emphasis>TIP</emphasis> Setting up a mirror without synchronisation</title>
+          <title><emphasis>TIP</emphasis> Setting up a mirror without synchronization</title>
 
 	  <para>RAID-1 volumes are often created to be used as a new disk,
 	  often considered blank. The actual initial contents of the disk
@@ -534,12 +534,12 @@ Working Devices : 2
 	  the data written after the creation of the volume, in particular
 	  the filesystem, can be accessed later.</para>
 
-	  <para>One might therefore wonder about the point of synchronising
+	  <para>One might therefore wonder about the point of synchronizing
 	  both disks at creation time. Why care whether the contents are
 	  identical on zones of the volume that we know will only be read
 	  after we have written to them?</para>
 
-	  <para>Fortunately, this synchronisation phase can be avoided by
+	  <para>Fortunately, this synchronization phase can be avoided by
 	  passing the <literal>--assume-clean</literal> option to
 	  <command>mdadm</command>. However, this option can lead to
 	  surprises in cases where the initial data will be read (for
@@ -1032,7 +1032,7 @@ brw-rw---- 1 root disk 253,  2  5 oct.  18:14 /dev/dm-2</computeroutput>
 
 	  <para>When the computer boots, the
 	  <filename>/etc/init.d/lvm</filename> script scans the available
-	  devices; those that have been initialised as physical volumes for
+	  devices; those that have been initialized as physical volumes for
 	  LVM are registered into the LVM subsystem, those that belong to
 	  volume groups are assembled, and the relevant logical volumes are
 	  started and made available. There is therefore no need to edit
@@ -1256,7 +1256,7 @@ The filesystem on /dev/vg_critical/lv_files is now 1835008 blocks long.
       <para>Let's take a concrete example: the public relations department
       at Falcot Corp needs a workstation for video editing, but the
       department's budget doesn't allow investing in high-end hardware from
-      the bottom up. A decision is made to favour the hardware that is
+      the bottom up. A decision is made to favor the hardware that is
       specific to the graphic nature of the work (monitor and video card),
       and to stay with generic hardware for storage. However, as is widely
       known, digital video does have some particular requirements for its
@@ -1580,7 +1580,7 @@ Disk identifier: 0x00039a9f
 </screen>
 
       <para>Once these prerequisites are installed, the next step is to
-      test the behaviour of the dom0 by itself; this involves a reboot to
+      test the behavour of the dom0 by itself; this involves a reboot to
       the hypervisor and the Xen kernel. The system should boot in its
       standard fashion, with a few extra messages on the console during the
       early initialization steps.</para>
@@ -1876,7 +1876,7 @@ testxen login: </computeroutput>
 	<para>Xen has many more features than we can describe in these few
 	paragraphs. In particular, the system is very dynamic, and many
 	parameters for one domain (such as the amount of allocated memory,
-	the visible hard drives, the behaviour of the task scheduler, and
+	the visible hard drives, the behavour of the task scheduler, and
 	so on) can be adjusted even when that domain is running. A domU can
 	even be migrated across servers without being shut down, and
 	without losing its network connections! For all these advanced
@@ -2429,7 +2429,7 @@ to the console to complete the installation process.
           <callout arearefs="virtinst.network">
 	    <para>The <literal>--network</literal> specifies how the
 	    virtual network card integrates in the host's network
-	    configuration. The default behaviour (which we explicitly
+	    configuration. The default behavour (which we explicitly
 	    forced in our example) is to integrate it into any pre-existing
 	    network bridge. If no such bridge exists, the virtual machine
 	    will only reach the physical network through NAT, so it gets an
@@ -2438,7 +2438,7 @@ to the console to complete the installation process.
           <callout arearefs="virtinst.vnc">
 	    <para><literal>--vnc</literal> states that the graphical
 	    console should be made available using VNC. The default
-	    behaviour for the associated VNC server is no only listen on
+	    behavour for the associated VNC server is no only listen on
 	    the local interface; if the VNC client is to be run on a
 	    different host, establishing the connection will require
 	    setting up an SSH tunnel (see <xref
--- a/en-US/13_workstation.xml
+++ b/en-US/13_workstation.xml
@@ -115,8 +115,8 @@
       when the provided driver exists, it is usually not as polished as it
       should be; more importantly, it does not necessarily follow the X.org
       updates, which may prevent the latest available driver from loading
-      correctly (or at all). We cannot condone this behaviour, and we
-      recommend you avoid these makers and favour more cooperative
+      correctly (or at all). We cannot condone this behavour, and we
+      recommend you avoid these makers and favor more cooperative
       manufacturers.</para>
 
       <para>If you still end up with such a card, you will find the
@@ -710,7 +710,7 @@
         <title>Tools for GTK+ on GNOME</title>
 
 	<para>Anjuta (in the <emphasis role="pkg">anjuta</emphasis>
-	package) is a development environment optimised for creating GTK+
+	package) is a development environment optimized for creating GTK+
 	applications for GNOME. Glade (in the <emphasis
 	role="pkg">glade</emphasis> package) is an application designed to
 	create GTK+ graphical interfaces for GNOME and save them in an XML
--- a/en-US/14_security.xml
+++ b/en-US/14_security.xml
@@ -281,7 +281,7 @@
       a packet, the firewall scans the appropriate chain, one rule after
       another; when the conditions for one rule are met, it “jumps”
       (hence the <literal>-j</literal> option in the commands) to the
-      specified action to continue processing. The most common behaviours
+      specified action to continue processing. The most common behavours
       are standardized, and dedicated actions exist for them. Taking one of
       these standard actions interrupts the processing of the chain, since
       the packet's fate is already sealed (barring an exception mentioned
@@ -642,7 +642,7 @@ iface eth0 inet static
     restricted to guaranteeing data confidentiality, but it also includes
     ensuring availability of the services. It is therefore imperative to
     check that everything works as expected, and to detect in a timely
-    manner any deviant behaviour or change in quality of the service(s)
+    manner any deviant behavour or change in quality of the service(s)
     rendered. Monitoring activity can enable the detection of intrusion
     attempts and enable a swift reaction before they cause grave
     consequences. This section reviews some tools that can be used to
@@ -968,7 +968,7 @@ iface eth0 inet static
         </sidebar>
 
 	<para>Many options in <filename>/etc/default/aide</filename> can be
-	used to tweak the behaviour of the <emphasis
+	used to tweak the behavour of the <emphasis
 	role="pkg">aide</emphasis> package. The AIDE configuration proper
 	is stored in <filename>/etc/aide/aide.conf</filename> and
 	<filename>/etc/aide/aide.conf.d/</filename> (actually, these files
@@ -1468,7 +1468,7 @@ user_u          user       s0         s0               user_r
 	tcp 8080</command>.</para>
 
 	<para>Some SELinux modules export boolean options that you can
-	tweak to alter the behaviour of the default rules. The
+	tweak to alter the behavour of the default rules. The
 	<command>getsebool</command> utility can be used to inspect those
 	options (<command>getsebool
 	<replaceable>boolean</replaceable></command> displays one option,
@@ -1751,7 +1751,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file)
 	<para>However, an empirical approach is possible. Once the
 	relevant objects are correctly labeled, you can use the
 	application in permissive mode: the operations that would be
-	forbidden are logged but still succeed. By analysing the logs, you
+	forbidden are logged but still succeed. By analyzing the logs, you
 	can now identify the operations to allow. Here is an example of
 	such a log entry:</para>
 
@@ -2011,7 +2011,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file)
       of the active connections, and so on. Using the root permissions, the
       attacker was able to observe the whole system, but didn't find
       important data; so they will try accessing other machines in the
-      corporate network. Analysing the administrator's account and the
+      corporate network. Analyzing the administrator's account and the
       history files, the attacker finds what machines are routinely
       accessed. By replacing <command>sudo</command> or
       <command>ssh</command> with a subverted program, the attacker can
@@ -2276,7 +2276,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file)
       <sidebar>
         <title><emphasis>CAUTION</emphasis> Hot analysis</title>
 
-	<para>While it may seem tempting to analyse the system as it runs,
+	<para>While it may seem tempting to analyze the system as it runs,
 	especially when the server is not physically reachable, this is
 	best avoided: quite simply you can't trust the programs currently
 	installed on the compromised system. It's quite possible for a
--- a/en-US/15_debian-packaging.xml
+++ b/en-US/15_debian-packaging.xml
@@ -117,7 +117,7 @@
       …</literal>) are easy to spot. If these commands are not explicitly
       called, they are probably a side effect of another explicit command,
       in which case please refer to their documentation to learn more about
-      how to change the default behaviour.</para>
+      how to change the default behavour.</para>
 
       <para>Depending on the local changes to the packages, an update may
       also be required in the <filename>debian/control</filename> file,
@@ -542,7 +542,7 @@ target: sources
       contains only the bare minimum for running a standard set of commands
       provided by the <command>debhelper</command> tool. Such is the case
       for files generated by <command>dh_make</command>. To install our
-      files, we simply configure the behaviour of the
+      files, we simply configure the behavour of the
       <command>dh_install</command> command by creating the following
       <filename>debian/falcot-data.install</filename> file:</para>
 
--- a/en-US/92_short-remedial-course.xml
+++ b/en-US/92_short-remedial-course.xml
@@ -744,7 +744,7 @@ Bus 002 Device 004: ID 413c:8103 Dell Computer Corp. Wireless 350 Bluetooth
       process, and stops giving it slices of running time. The parent
       process is told about its child process being terminated, which
       allows a process to wait for the completion of a task it delegated to
-      a child process. This behaviour is plainly visible in command-line
+      a child process. This behavour is plainly visible in command-line
       interpreters (known as <emphasis>shells</emphasis>). When a command
       is typed into a shell, the prompt only comes back when the execution
       of the command is over. Most shells allow for running the command in

Reply via email to